{"title":"Prioritizing Cloud Service Threats for Succession to Information Security Management System","authors":"H. Jung, K. Seo","doi":"10.21742/ijdcasd.2020.7.1.01","DOIUrl":null,"url":null,"abstract":"With the growth of the cloud computing industry, there is also an increased risk that cloud service providers are stably providing services. Cloud service providers need to identify these threats and be proactive. Because cloud service is a service that requires a high availability rate of at least 99.9%. Therefore, this study presents a framework for collecting and prioritizing potential threats that could compromise the service of a cloud service provider. In addition, a case study was conducted to verify the proposed framework. This framework can be used only when the cloud service provider has a risk management procedure, and has a limitation in that the subjective characteristics of the cloud service provider may be included in the use of the framework. Nevertheless, it can be used in establishing a proactive threat management plan for cloud service delivery and researching cloud security management methodology.","PeriodicalId":159690,"journal":{"name":"International Journal of Digital Contents and Applications for Smart Devices","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Digital Contents and Applications for Smart Devices","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21742/ijdcasd.2020.7.1.01","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
With the growth of the cloud computing industry, there is also an increased risk that cloud service providers are stably providing services. Cloud service providers need to identify these threats and be proactive. Because cloud service is a service that requires a high availability rate of at least 99.9%. Therefore, this study presents a framework for collecting and prioritizing potential threats that could compromise the service of a cloud service provider. In addition, a case study was conducted to verify the proposed framework. This framework can be used only when the cloud service provider has a risk management procedure, and has a limitation in that the subjective characteristics of the cloud service provider may be included in the use of the framework. Nevertheless, it can be used in establishing a proactive threat management plan for cloud service delivery and researching cloud security management methodology.